From patchwork Wed Jul 5 10:35:38 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ke Xu X-Patchwork-Id: 129286 X-Patchwork-Delegate: qi.z.zhang@intel.com Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 12B7D42DCC; Wed, 5 Jul 2023 12:36:16 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id DFA9F4021F; Wed, 5 Jul 2023 12:36:15 +0200 (CEST) Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by mails.dpdk.org (Postfix) with ESMTP id A89BA40150 for ; Wed, 5 Jul 2023 12:36:14 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1688553374; x=1720089374; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=QIsa+DSCtRr1lwJCgvle2FnlK4AtLrYXf+q7ILMIr1A=; b=c+nnEusQAFo94TmYjJC49YZBziSkBO0olSY84In6vxyIPf7nrDmTcgZT q0HT2sQj1Uouzipf9Or0Ka0UClFOj9CnXoYqijF+Q9XO8mdM6ONCbZ+L0 3M2gNgDi6Z+dcg4pNqnR7bjmuWcejqLU9hk7Rba2OQ8V2Uway8WuAinWV FNGyqRBsvhvCEZw1YlpQDGwlU1AhhhTVT+MMbhxJOggbpLcwDyJeAHaI2 PYVuCQxp3MAOk275ekhHCXhe7nX3lZDZDQSi+IqPJwJzC/4sqZ/KrMWPl 1y4ya+/Dph2o1NDpR+t85ihpAi+96qwuw03pQADR3t38iZzQVAl4YeXTX A==; X-IronPort-AV: E=McAfee;i="6600,9927,10761"; a="342897172" X-IronPort-AV: E=Sophos;i="6.01,182,1684825200"; d="scan'208";a="342897172" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jul 2023 03:36:11 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10761"; a="719175153" X-IronPort-AV: E=Sophos;i="6.01,182,1684825200"; d="scan'208";a="719175153" Received: from dpdk-xuke-host.sh.intel.com ([10.67.114.220]) by orsmga002.jf.intel.com with ESMTP; 05 Jul 2023 03:35:55 -0700 From: Ke Xu To: dev@dpdk.org Cc: ke1.xu@intel.com, zhichaox.zeng@intel.com, wenzhuo.lu@intel.com Subject: [PATCH] net/iavf: fix Tunnel TSO path selecting. Date: Wed, 5 Jul 2023 10:35:38 +0000 Message-Id: <20230705103538.903685-1-ke1.xu@intel.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org IAVF curerently supports TSO and Tunnel TSO. Both these two features are implemented in scalar path. As there are missed flags for Tunnel TSO, it selects vector paths wrongly when only Tunnel TSO is enabled. This patch added the missed flags to fix the Tunnel TSO path selecting. Signed-off-by: Ke Xu --- drivers/net/iavf/iavf_rxtx.h | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/drivers/net/iavf/iavf_rxtx.h b/drivers/net/iavf/iavf_rxtx.h index 8d4a77271a..605ea3f824 100644 --- a/drivers/net/iavf/iavf_rxtx.h +++ b/drivers/net/iavf/iavf_rxtx.h @@ -31,6 +31,10 @@ RTE_ETH_TX_OFFLOAD_QINQ_INSERT | \ RTE_ETH_TX_OFFLOAD_MULTI_SEGS | \ RTE_ETH_TX_OFFLOAD_TCP_TSO | \ + RTE_ETH_TX_OFFLOAD_VXLAN_TNL_TSO | \ + RTE_ETH_TX_OFFLOAD_GRE_TNL_TSO | \ + RTE_ETH_TX_OFFLOAD_IPIP_TNL_TSO | \ + RTE_ETH_TX_OFFLOAD_GENEVE_TNL_TSO | \ RTE_ETH_TX_OFFLOAD_SECURITY) #define IAVF_TX_VECTOR_OFFLOAD ( \